HUB International. Security Risk Management Services

Size: px
Start display at page:

Download "HUB International. Security Risk Management Services"

Transcription

1 HUB International Security Risk Management Services Prepared by: Hart S. Brown, CORP, CBCP, LPQ Vice President, Practice Leader Organizational Resilience HUB International Risk Services

2 Table of Contents Executive Summary.. 3 HUB International. 4 Risk Services 5 Security Risk Management Services 6 Client Commitment 12 HUB Biographies 13 Legal Notice All consulting services performed by HUB are advisory in nature. All resultant report is based upon conditions and practices observed by HUB and information supplied by the client. Any such reports may not identify or contemplate all unsafe conditions and practices; others may exist. HUB does not imply, guarantee or warrant the safety of any of the client s properties or operations or that the client or any such properties or operations are in compliance with all federal, state or local laws, codes, statutes, ordinances, standards or recommendations. The advice and recommendations submitted in this plan constitute neither a warranty of future results nor an assurance against risk. All decisions in connection with the implementation, if any, of any of HUB s advice or recommendations shall be the sole responsibility of, and made by, the client. Page 2

3 Executive Summary HUB International offers security risk management services to selected clients and family offices. As an introduction to these services, we are pleased to present the details of the security risk management capabilities in the pages that follow. The information will serve to familiarize your team with the types of assistance that we believe will be of value to you and your clients. The services can be developed and delivered as a package or individualized and tailored to meet specific and individual requests as each service type is designed to be flexible and adaptable to the needs of the client. All services will be proposed at an agreed-to cost structure and billed at completion. Additional information can be found: HUB Crisis Management Website - HUB Cyber Risk Website - HUB Personal Insurance Website - HUB Family Office Website Page 3

4 HUB International Headquartered in Chicago, IL, HUB International Limited is a leading global insurance brokerage that provides a broad array of property and casualty, life and health, employee benefits, investment and risk management products and services from offices located throughout North America. HUB International has more than 8,800 employees in more than 350 offices. Since 1998, HUB has focused on developing innovative risk management solutions for leading family office organizations ad high net worth clients. By combining our broad range of products with expert advice, our clients are assured we will deliver a complete risk solution with the level of service they deserve. Accomplished risk services consultants with an average of more than 20 years experience. Security expertise in more than 50 countries worldwide. Geographic reach in offering clients regional expertise and solutions throughout North America and internationally. High net worth specialty practices that offer expertise in risk solutions for aircraft, watercraft, equine, farms and ranches. Fine art and collectibles team specializing in cultural institutions, galleries and significant individual collections. Flexible service platform that meets the specific risk management needs of each high net worth individual or family. Strategic Locations HUB International is structured around large regional hubs with satellite offices strategically located throughout North America. Our geographic footprint includes more than 350 offices. The diversified and localized presence provides a significant competitive advantage. Personal service, individual attention and the ability to respond quickly to client needs. We are able to provide local representation to high net worth individuals and families almost anywhere within North America. Internationally, we can support clients directly or through partner service providers. Page 4

5 Risk Services The HUB Risk Services is based out of our headquarters in Chicago, Illinois and offers tailored solutions to clients with consultants located strategically North America. Our team of nearly 100 risk consultants has the proven knowledge and experience to assist in identifying current/potential risks and implementing controls to reduce exposure to loss, as well as partnering with our clients to create claims management processes and address claim issues should they occur. This experience and geographic reach creates a large number of core services, but still allows our local team members to be responsive to individual needs, providing custom solutions to address specific risks. Based on the needs of our clients, our risk team can provide services around the globe directly or through local partnerships. HUB maintains a flexible approach to connect our clients with the specific HUB Risk Services team member that can best fulfill your goals and objectives. Our team members include: Security professionals Crisis management professionals Cyber risk management professionals Board-certified safety professionals Certified risk managers Certified construction risk specialists Environmental risk managers Property protection specialists Former corporate directors General liability experts Emergency response professionals Fire protection / professional engineers HUB International specializes in a wide variety of risk services products and consultancy. Because we serve both commercial and private clients, we can offer solutions that are properly scaled to meet your specific needs. High Net Worth/Family office risk management Security risk management Crisis management Property risk engineering Safety & environmental management Transportation risk management Construction safety management Industrial Hygiene Travel risk management Cyber risk management Enterprise risk management Business continuity management Emergency management Entertainment risk management Environmental management Claims management Page 5

6 HUB Security Risk Management HUB Security Risk Management Services 24/7/365 Access to Security and Crisis Advisory Services Subscribing members have access to security advisory services on a 24/7/365 basis applicable anywhere in the world. The basic service includes two assistance calls per year. Assistance thereafter is at a cost of $60 per call. These advisory services include: Threat assessments Preventive security recommendations Security response processes and procedures Coordination with local security or crisis response services Coordination with insurance carrier provided crisis services Specialized Identity Theft Protection Identity theft protection guides, monitors, protects, and restores client identities. Specific services include cyber concierge services, consulting services, proactive third-party inquiries, breach response and remediation as well as focused monitoring and resolution services. Background Checks (US and Canada) The background check service is provided to clients to review both the professional and personal history of a new or existing employee. The investigation includes criminal history, credit history and employment history in order to reduce risk and assess suitability. Cyber Activity Risk Assessment The cyber risk activity assessment reviews how data is accessed and shared in order to determine the potential exposure of private information. The results can be reviewed to establish an overall risk exposure. The assessment includes: Physical protection of devices File storage Online activity Mobile device procedures protection Social media usage Travel Page 6

7 International Background Checks International background checks can be an important part of a thorough, comprehensive background check. It is recommended that international criminal checks be conducted when considering applicants from abroad or applicants who have recently come from overseas. In addition, international background checks should be considered for U.S. citizens who have worked or been educated abroad and foreign nationals for a position in their home country. Employee Personality/Suitability Assessments The employee personality or suitability assessment ensures an appropriate match for a potential position. It is comprised of a series of questions that are administered online and in multiple languages to determine an individual s personality and behavioral style. The profile is electronically scored creating a profile report assessing honesty and integrity, as well as the propensity to steal, use drugs, lie, exhibit hostility, or have an entitlement mentality. Investigative Services HUB is able to coordinate investigations and due diligence services virtually anywhere in the world, through its networks of partnerships in more than 200 cities worldwide. Investigations can include potential business partners, customers, suppliers, licensees/agents, distributors, potential joint-venture partners, subsidiaries or merger and acquisition candidates. HUB can facilitate local resources to limit potential risk and establish due diligence in decision-making processes. Online Reputation Assessment Reputation can be considered an asset and the protection of a person s online presence and reputation may be considered for personal preferences, security reasons, financial reasons or due to professional requirements. A scan to determine the types of information that are easily identifiable and attributable will be conducted on open records, news outlets, professional publications, blogs and social media platforms. The results will be reviewed and various security and reputational management options and recommendation will be proposed for consideration. Page 7

8 Cyber Security Assessment The cyber security assessment combines a cyber-health check with an independent, objective review of your personal and organization s security and privacy practices. A remote scan of your perimeter network devices such as firewalls, web servers, servers, etc. will be conducted to mitigate vulnerabilities and stave off potential attacks. Property Security Assessment The property security assessment is comprised of two parts, a threat assessment and a vulnerability assessment. The threat assessment is conducted to assess the potential of specific security related incidents. The vulnerability assessment is a systematic evaluation to detect security gaps in the current physical security system. This includes crime prevention through environmental design (CPTED) factors. It is used to determine the effectiveness of countermeasures in protecting specific property types from specific aggressors. This service is applicable for a residence, watercraft, aircraft and assets such as jewelry, art, antiques, guns or other valuable possessions and includes a review of: Historical security events Crime trends Risk factors Qualitative threat assessment Day and night evaluations Intrusion detection Alarm assessment CCTV systems Entry control Delay mechanisms Personal Security Awareness Training Personal security awareness training provides individuals with the foundation on gaining knowledge of crime as a process, improving situational awareness of surroundings, providing effective crime avoidance strategies and reinforcing the importance of obeying intuition. Developing and strengthening security awareness techniques can help ensure individuals have an understanding of family expectations, as well as company security procedures and best practices. This includes: Indicators of crime Recognizing surveillance Recognizing indicators of violence Conflict de-escalation Driving security Safety in elevators, parking lots, walking areas Hotel selection and travel safety Immediate response actions to take Assistance with Coordinating Security Services Assisting and coordinating security services includes supporting alarm systems, security drivers, executive protection personnel and crisis response services. HUB experts can recommend security organizations that have met standardized security operating standards and can assist in defining actions to be taken to increase security arrangements if the threat or their exposure changes. These services can be coordinated for special events, while traveling or as a per client request basis. Page 8

9 Threat of Violence Consultation Security consultation can give direction and support before, during, and after threatening situations and include the use of behavioral health professional, as needed. Threat of violence consultation is designed to create an organized and sequential approach to threat management. Immediate response Threat assessment Defusing actions Travel Briefs The HUB travel brief provides guidelines to minimize risks, costs and the impact of a potential incident while traveling. This brief is specific to a location and provides insight on security, natural hazards and medical risks. This includes: Destination or location overview Tailored risk assessments Latest crime information Advice on how to avoid becoming a victim Natural hazards (earthquakes, floods, storms, etc.) Local health concerns (vaccinations, things to avoid) Recommended hospital in the area Emergency contacts Protective Intelligence Updates Protective intelligence services are offered as a way to maintain up-to-date information on specific incidents impacting individuals worldwide. These intelligence updates can be distributed electronically to clients using the best information and analysis available in order to deliver appropriate advice and recommendations. The updates are designed to provide timely, actionable products that assist in mitigating safety and security risks. In addition, clients can make requests and inquiries regarding specific incidents or locations. Kidnap, Ransom/Extortion Response Services Kidnap/extortion response services provide advice on creating preparatory response plans, as well as advocating for the client as part of a crisis response. Response plans focus on immediate actions and response procedures that can be applied to any individual that may encounter this type of situation worldwide. The plan includes the following: Response priorities Incident assessments and escalation steps Domestic and international incidents evaluation Communications with authorities Response team appointments Communicator responsibilities Working with an advisor guidance Information and physical security assessment Kidnap stages and preparations Financial aspects of a kidnap Page 9

10 Evacuation Planning and Response Coordination Evacuation from a security or medical crisis can become difficult to manage. The evacuation support services provide coordination for the emergency evacuation of clients, dependents and other travelers in situations where it is no longer safe to remain in the location. The services include guidance to conduct of an evacuation, and operations and implementation procedures including: Incident coordination Indicators, triggers, security levels Evacuation preparation and warning Decision to evacuate process Conduct of the evacuation Evacuation procedure checklists Property Risk Assessment HUB Property Risk Consultants partner with our clients to understand their goals, objectives and challenges, as well as develop/implement property risk solutions that identify and minimize risk. The property risk assessment is designed to assess hazardous events and guidance on how to mitigate damage. This can include new residences, renovation/construction at a current residence and other larger assets. Property audits and reviews Natural hazard assessments Fire evaluation Property replacement costs calculations Property construction assessment Staff and employee training Emergency response planning Environmental compliance review Disaster Planning and Response Coordination Thoughtful preparation and planning pre-disaster can make a difference in mitigating potential negative consequences. HUB can assist in developing a response plan, as well as coordinating necessary support during a response. A disaster plan can be developed through the evaluation of hazards that are inherent near the location and addresses how to manage a potential incident. The plan should facilitate actions through pre-determined guidelines during and after the incident. The plans can include: Contacting emergency services Description of potential hazards Emergency evacuation or shelter in-place Accountability and communication Fire response procedures Severe weather response procedures Bomb threat response procedures Medical and rescue coordination Page 10

11 Electronic Countermeasures Assessment As there can be concerns related to the confidentiality of high level conversations, HUB can facilitate an electronic countermeasures assessment or sweep to minimize the potential for listening devices and electronic surveillance. The assessments and equipment that can be used are designed to detect, disrupt and/or defeat sophisticated electronic information gathering measures. These assessments can be done on a regular basis, based upon a change in the security environment or upon request. Lifestyle Assessment The lifestyle assessment is designed to identify potential risks presented to the client and evaluate mitigation strategies. Through discussions or a questionnaire, the discovery process is intended to capture as much information about the status, existing functionality and desired direction regarding a client s security risk management approach. Key deliverables for the lifestyle assessment reports include: Security profile Travel profile Activity profile Crisis Counseling Crisis counseling is available for those faced with a traumatic event or other situation where there is a need for psychological crisis support. Services normally begin with a short phone call between the counselor and a representative of the family and then potentially an on-site visit. Once engaged, individuals can call 24/7/365 and speak to a trained counselor on a completely anonymous and secure line. Counseling can be conducted: One-to-One Small groups Families Page 11

12 Client Commitment The HUB Advantage Our global resources and local relationships create world-class results for clients. With offices across North America, we are uniquely positioned to tailor solutions to meet local needs. Doing business with HUB means you can be assured that we will deliver constant innovation, integrity, and partnership. This discipline keeps us focused on providing advanced risk management services to all of our clients. HUB is the premiere resource for protecting and preserving personal, family and estate assets. As a trusted advisor, HUB is committed to help you manage risk and achieve your professional and personal goals. Our risk services division offers highly trained, experienced professionals who provide expert guidance and customized risk management solutions. HUB International s service philosophy is the driving force behind our culture. It is a business philosophy that says, Our Client Always Comes First. It means client-centric services, upholding the highest standards of ethical conduct, integrity, expertise, communication and responsiveness. Page 12

13 Biographies HART S. BROWN, CORP, CBCP, LPQ Senior Vice President - Organizational Resilience, Risk Services Division Hart Brown brings 20 years of experience in security, crisis management, emergency management, and business continuity to HUB International, currently serving as the Vice President and Practice Leader of Organizational Resilience in the Risk Services Division. Hart is an internationally recognized thought leader and has worked for several of the US Government s top agencies as well as leading private companies. He has served as a consultant, media contributor, conference presenter and author on crisis management issues. Prior to HUB, Mr. Brown was responsible for the security & crisis management for a multi-national retailer. His responsibilities included establishing market risk profiles, protective intelligence, executive protection, travel risk management and supply chain security for the company s global expansion. He conducted training & exercises, and managed crisis, business continuity, security events for the organization. As the crisis team leader, he designed the corporate critical incident management program and created specialized response plans for incidents of workplace violence and kidnapping and extortion. Formerly, Hart worked with the US Department of State, Diplomatic Security Service, Anti-Terrorism Assistance Program where he assisted partner countries in enhancing national level services related to critical incident management, vital infrastructure security, diplomatic protection, interdicting terrorist activity, response to hazardous materials incidents and hospital based management for mass casualty events. This includes supporting major global events such as the World Cup in South Africa and the APEC conference in Peru. In previous roles, Hart was instrumental in developing various crisis and security management plans for large corporations, universities and non-governmental organizations as a senior consultant for International SOS. In 2002, he provided leadership in security management, threat assessments and executive protection with WorldCom during one of the largest bankruptcies in US history. In 1998 using statistical methods he developed to evaluate the potential for targeted violence, Hart created the foundation for the US National Threat and Risk Assessment Program under the US Department of Justice. Hart was a co- author of the 2014 ANSI/ASIS SPC.2 standard on Auditing Management Systems for Risk, Resilience, Security and Continuity Management. He has received an Award of Appreciation from President George W. Bush for providing security and crisis management services during a government transition in the Middle East, as well as awards of appreciation from 12 host countries for his role in safety and security management. He is well published on the topics of security, travel risk management, kidnap response planning, threat assessments, workplace violence, business continuity, and crisis management, and is a regular presenter at industry conferences. Hart is a Board Certified Organizational Resilience Professional, Business Continuity Professional and Loss Prevention. He is the Vice Chair of the ASIS International Crisis Management & Business Continuity Council and is a member of the Chief Security Officer (CSO) Roundtable where he sits on the Nominating & Governance committee. Other government and industry associations include the Domestic Security Advisory Council, Overseas Security Advisory Council, FBI Infragard, the DHS Fusion Center, the Loss Prevention Foundation and the Security Executives Roundtable. He is a graduate of Texas A&M University with a Bachelor of Science degree in Radiological Health Engineering (Nuclear Engineering/Medicine) and a Masters of Science in Safety Engineering. In addition, he is a graduate of the Federal Bureau of Investigation Domestic Security Executive Academy. Page 13

14 JOHN FARLEY, CIPP/US, AIC Vice President - Cyber Risk Management Services, Risk Services Division John Farley is currently serving as a Vice President and Cyber Risk Consulting Practice Leader for HUB International s Risk Services Division. Headquartered in Chicago, IL. John is based in New York City and brings 24 years of risk consulting experience to the firm. While working at HUB International John has performed a variety of cyber risk consulting services for clients across many industries, including but not limited to personal cyber risks, Healthcare, Retail, Financial Services, Higher Education and Information Technology companies. He serves as a resource for pre-breach planning and post-data breach response in network security & privacy liability consulting. In this role he applies extensive knowledge in data breach response best practices and works diligently with clients to achieve optimal results in cost mitigation. John acts as a central coordinator between all parties involved - the client, insurance carriers, and any outsourced service provider hired, including, IT forensics experts, privacy attorneys, public relations firms, call center operators and other breach response service providers. John also facilitates online access to HUB International's e-risk Hub. This online database serves clients ongoing educational needs in the ever-changing network security and privacy risk environment. In addition, John provides client training that assists clients efforts in forecasting potential loss costs related to a network security event. He is a regular speaker at educational seminars on multiple network security and privacy liability challenges facing organizations today. Areas of focus are HIPAA, Payment Card Industry Data Security Standards, FERPA, government threat sharing initiatives, regulatory compliance and data breach notice requirements at the state, federal and international levels. John has a Bachelors of Arts degree in English and a minor in Business Management from Manhattan College. In addition, John is a Certified Information Privacy Professional (CIPP/US) and has received his Associate in Claims (AIC) designation. Page 14

15 ROSS ALBERT, CAMS Assistant Vice President - Organizational Resilience, Security Risk Management Specialist, Risk Services Division Ross Albert has 10 years of experience in public and private intelligence, corporate investigations, international security and risk management and is currently serving as the AVP for the Organizational Resilience Practice with HUB International. Ross is an industry leader in establishing intelligence led risk management programs and developing public-private intelligence cooperation Prior to joining HUB, Ross was an Anti-Money Laundering Analyst for K2 Intelligence, where he advised financial institutions on all aspects of anti-money laundering investigations, OFAC sanctions and regulatory compliance. As part his work with large multi-national banks, he was instrumental in a number of significant investigations including the FIFA corruption scandal. Through the development of analytical processes, programs, policies and plans he supported these financial institutions in identifying and reporting suspicious activity. Prior to joining K2, Ross was an International Security Intelligence Analyst for Rent-A-Center, Inc. based in Dallas. As their lead intelligence analyst, he served a key role protecting personnel and assets in over 200 locations in Mexico. Ross was responsible for threat and risk assessments on various markets in Mexico and Latin America, which were used to determine the strategic direction and support the corporate expansion in the region. In addition, Ross created and designed unique methods for the use of social media analytics as a real-time, early warning mechanism as part of an intelligence led security risk management program. He was a member of the corporate crisis team where he managed multiple critical incidents. He also worked closely with government agencies such as the US Department of State, the Department of Homeland Security and US Treasury Department s Office of Foreign Assets Control (OFAC). Previously, Ross held positions with the New Jersey Transit Police Intelligence Section and the New Jersey Office of Homeland Security and Preparedness where he provided investigative case support for law enforcement personnel, conducted open source research on terrorism intelligence issues and prepared daily intelligence briefs. He also previously worked at Morgan Stanley in their Private Wealth Management division, assisting in developing investment and financial analysis for high-net worth clients. Ross has published work on transnational crime in Latin America and terrorist financing. He is a Certified Anti- Money Laundering Specialist (CAMS) and is a member of the Overseas Security Advisory Council, DHS Fusion Center, Association of Certified Anti-Money Laundering Specialists and the New York Analysts Roundtable. He earned an M.A. in International Relations from Seton Hall University, specializing in Security Studies and Latin America. He holds a Professional Certificate in Global Affairs from New York University, and earned a B.A. in Political Science from the University of Michigan. Page 15

COUNTERING IMPROVISED EXPLOSIVE DEVICES

COUNTERING IMPROVISED EXPLOSIVE DEVICES COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 COUNTERING IMPROVISED EXPLOSIVE DEVICES Strengthening U.S. Policy Improvised explosive devices (IEDs) remain one of the most accessible weapons

More information

People Assets Reputation

People Assets Reputation Welcome to Spearpoint International LLC The risks faced by global business are greater now than ever, the increasing danger from terrorism and the ever present threat from organized and opportunistic crime

More information

Best Practices for Campus Security. January 26, 2017

Best Practices for Campus Security. January 26, 2017 Best Practices for Campus Security January 26, 2017 Welcome to Safe University (Safe U ) Protecting People, Property, and Tradition: The Safe University (Safe U SM ) Program By G. Michael Verden, Owner

More information

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO CHAPTER: @IIACHI #IIACHI WWW.FACEBOOK.COM/IIACHICAGO HTTPS://WWW.LINKEDIN.COM/GROUPS/1123977 1 CAE Communications and Common Audit Committee

More information

Security and Privacy Governance Program Guidelines

Security and Privacy Governance Program Guidelines Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by

More information

Department of Management Services REQUEST FOR INFORMATION

Department of Management Services REQUEST FOR INFORMATION RESPONSE TO Department of Management Services REQUEST FOR INFORMATION Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services September 3, 2015 250 South President

More information

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18 Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are

More information

Cyber Risks in the Boardroom Conference

Cyber Risks in the Boardroom Conference Cyber Risks in the Boardroom Conference Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks

More information

Max Security Solutions

Max Security Solutions Max Security Solutions Max Security Solutions Proactive Risk Management What we do Max Security provides comprehensive security and risk management solutions for the business sector, private clients and

More information

TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE

TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE Association of Corporate Counsel NYC Chapter 11/1 NYC BDO USA, LLP, a Delaware limited liability partnership,

More information

COUNTERING IMPROVISED EXPLOSIVE DEVICES

COUNTERING IMPROVISED EXPLOSIVE DEVICES COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour

More information

Application for Certification

Application for Certification Application for Certification Requirements to Become a Certified Information Security Manager To become a Certified Information Security Manager (CISM), an applicant must: 1. Score a passing grade on the

More information

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW EXECUTIVE SUMMARY CenturyLink is committed to ensuring business resiliency and survivability during an incident or business disruption. Our Corporate Business

More information

Cybersecurity Overview

Cybersecurity Overview Cybersecurity Overview DLA Energy Worldwide Energy Conference April 12, 2017 1 Enterprise Risk Management Risk Based: o Use of a risk-based approach for cyber threats with a focus on critical systems where

More information

PROVIDING INVESTIGATIVE SOLUTIONS

PROVIDING INVESTIGATIVE SOLUTIONS PROVIDING INVESTIGATIVE SOLUTIONS Experienced Professionals Northeast Intelligence Group, Inc. (NEIG) has been helping clients meet challenges for more than twenty years. By providing meaningful and timely

More information

Security Program Design:

Security Program Design: Security Program Design: A Critical Infrastructure Protection Model Experience, Dedication, and Leadership July 17-18, 2013 Toronto, Ontario CAN in Security EDUCATION Earn up to 16 CPEs Are you confident

More information

Department of Homeland Security Updates

Department of Homeland Security Updates American Association of State Highway and Transportation Officials Special Committee on Transportation Security and Emergency Management 2016 Critical Infrastructure Committee Joint Annual Meeting Department

More information

locuz.com SOC Services

locuz.com SOC Services locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security

More information

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services EY s Forensic

More information

Global Security Consulting Services, compliancy and risk asessment services

Global Security Consulting Services, compliancy and risk asessment services Global Security Consulting Services, compliancy and risk asessment services Introduced by Nadine Dereza Presented by Suheil Shahryar Director of Global Security Consulting Today s Business Environment

More information

Investigating Insider Threats

Investigating Insider Threats Investigating Insider Threats February 9, 2016 Jonathan Gannon, AT&T Brenda Morris, Booz Allen Hamilton Benjamin Powell, WilmerHale 1 Panelist Biographies Jonathan Gannon, AT&T, Executive Director & Senior

More information

A Framework for Managing Crime and Fraud

A Framework for Managing Crime and Fraud A Framework for Managing Crime and Fraud ASIS International Asia Pacific Security Forum & Exhibition Macau, December 4, 2013 Torsten Wolf, CPP Head of Group Security Operations Agenda Introduction Economic

More information

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Coordination Division Overview ND Safety Council Annual Conference

More information

Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security

Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security 1 Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security 2 Government Services 3 Business Education Social CYBERSPACE

More information

Information Security Incident Response Plan

Information Security Incident Response Plan Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,

More information

Corporate Security & Emergency Management Summary of Submitted 2015 Budget From Rates

Corporate Security & Emergency Management Summary of Submitted 2015 Budget From Rates Corporate Security & Emergency Management Summary of Submitted 2015 From Rates Service Expense 2014 2015 Revised Non Tax Revenue Net Tax Supported Expense Draft Non Tax Revenue Net Tax Supported Increase

More information

IMPROVING NETWORK SECURITY

IMPROVING NETWORK SECURITY IMPROVING NETWORK SECURITY How AN Information Assurance Professional Assessment HELPED THE The City of Stow, Ohio is a community of just under 35,000 people, located 35 miles south of Cleveland and part

More information

Sage Data Security Services Directory

Sage Data Security Services Directory Sage Data Security Services Directory PROTECTING INFORMATION ASSETS ENSURING REGULATORY COMPLIANCE FIGHTING CYBERCRIME Discover the Sage Difference Protecting your business from cyber attacks is a full-time

More information

ACTIVE SHOOTER RESPONSE CAPABILITY STATEMENT. Dynamiq - Active Shooter Response

ACTIVE SHOOTER RESPONSE CAPABILITY STATEMENT. Dynamiq - Active Shooter Response ACTIVE SHOOTER RESPONSE CAPABILITY STATEMENT ACTIVE SHOOTER RESPONSE Responding to armed assault acts of terrorism and active shooter incidents Acts of terrorism and shootings in public places have become

More information

Credit Card Data Compromise: Incident Response Plan

Credit Card Data Compromise: Incident Response Plan Credit Card Data Compromise: Incident Response Plan Purpose It is the objective of the university to maintain secure financial transactions. In order to comply with state law and contractual obligations,

More information

CYBER RESILIENCE & INCIDENT RESPONSE

CYBER RESILIENCE & INCIDENT RESPONSE CYBER RESILIENCE & INCIDENT RESPONSE www.nccgroup.trust Introduction The threat landscape has changed dramatically over the last decade. Once the biggest threats came from opportunist attacks and preventable

More information

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017 DHS Cybersecurity Election Infrastructure as Critical Infrastructure June 2017 Department of Homeland Security Safeguard the American People, Our Homeland, and Our Values Homeland Security Missions 1.

More information

Vice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security

Vice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security Plenary Session: Cybersecurity the Current Regulatory Environment: Insight from Regulators and Industry Experts Thursday, February 22 3:45 p.m. 4:45 p.m. With recent high-profile data breaches, cybersecurity

More information

National Policy and Guiding Principles

National Policy and Guiding Principles National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework

More information

Information Security Incident Response Plan

Information Security Incident Response Plan Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,

More information

CCISO Blueprint v1. EC-Council

CCISO Blueprint v1. EC-Council CCISO Blueprint v1 EC-Council Categories Topics Covered Weightage 1. Governance (Policy, Legal, & Compliance) & Risk Management 1.1 Define, implement, manage and maintain an information security governance

More information

HOTEL RESILIENT Plan ahead stay ahead. With support from the German Government through

HOTEL RESILIENT Plan ahead stay ahead. With support from the German Government through HOTEL RESILIENT Plan ahead stay ahead With support from the German Government through WHAT CAN GO WRONG WILL GO WRONG Murphy s Law More than 40% of hotels do not reopen after large disasters FEMA 2010

More information

Office of Infrastructure Protection Overview

Office of Infrastructure Protection Overview Office of Infrastructure Protection Overview Harvey Perriott Protective Security Advisor North Texas District U.S. Department of Homeland Security Vision and Mission Vision A safe, secure, and resilient

More information

TSA/FTA Security and Emergency Management Action Items for Transit Agencies

TSA/FTA Security and Emergency Management Action Items for Transit Agencies TSA/FTA Security and Emergency Management Action Items for Transit Agencies AACTION ITEM LIST Management and Accountability 1. Establish Written System Security Programs and Emergency Management Plans:

More information

Managing Cyber Risk. Robert Entin Executive Vice President Chief Information Officer Vornado Realty Trust

Managing Cyber Risk. Robert Entin Executive Vice President Chief Information Officer Vornado Realty Trust Managing Cyber Risk Robert Entin Executive Vice President Chief Information Officer Vornado Realty Trust Adam Thomas Principal Cyber Risk Services Deloitte & Touche LLP Give Us Your Feedback for this Session!

More information

MassMutual Business Continuity Disclosure Statement

MassMutual Business Continuity Disclosure Statement MassMutual Business Continuity Disclosure Statement Overview Resiliency is a high priority at Massachusetts Mutual Life Insurance Company ( MassMutual or the Company ). To that end, significant investments

More information

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Today s cyber threat landscape is evolving at a rate that is extremely aggressive, Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely

More information

MNsure Privacy Program Strategic Plan FY

MNsure Privacy Program Strategic Plan FY MNsure Privacy Program Strategic Plan FY 2018-2019 July 2018 Table of Contents Introduction... 3 Privacy Program Mission... 4 Strategic Goals of the Privacy Office... 4 Short-Term Goals... 4 Long-Term

More information

Number: USF System Emergency Management Responsible Office: Administrative Services

Number: USF System Emergency Management Responsible Office: Administrative Services POLICY USF System USF USFSP USFSM Number: 6-010 Title: USF System Emergency Management Responsible Office: Administrative Services Date of Origin: 2-7-12 Date Last Amended: 8-24-16 (technical) Date Last

More information

ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update)

ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update) ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update) June 2017 INSERT YEAR HERE Contact Information: Jeremy Dalpiaz AVP, Cyber and Data Security Policy Jeremy.Dalpiaz@icba.org ICBA Summary

More information

Overseas Security Advisory Council U.S. Department of State Diplomatic Security

Overseas Security Advisory Council U.S. Department of State Diplomatic Security Overseas Security Advisory Council U.S. Department of State Diplomatic Security Overview Part I: OSAC Background History and Structure Part II: Services RISC Staff New Initiatives Part III: Website Part

More information

Cyber Security Strategy

Cyber Security Strategy Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from

More information

Protecting your data. EY s approach to data privacy and information security

Protecting your data. EY s approach to data privacy and information security Protecting your data EY s approach to data privacy and information security Digital networks are a key enabler in the globalization of business. They dramatically enhance our ability to communicate, share

More information

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors Page 1 of 6 Applies to: faculty staff students student employees visitors contractors Effective Date of This Revision: June 1, 2018 Contact for More Information: HIPAA Privacy Officer Board Policy Administrative

More information

Subject: University Information Technology Resource Security Policy: OUTDATED

Subject: University Information Technology Resource Security Policy: OUTDATED Policy 1-18 Rev. 2 Date: September 7, 2006 Back to Index Subject: University Information Technology Resource Security Policy: I. PURPOSE II. University Information Technology Resources are at risk from

More information

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,

More information

Legal, Ethical, and Professional Issues in Information Security

Legal, Ethical, and Professional Issues in Information Security Legal, Ethical, and Professional Issues in Information Security Downloaded from http://www.utc.edu/center-information-securityassurance/course-listing/cpsc3600.php Minor Changes from Dr. Enis KARAARSLAN

More information

79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90

79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90 th OREGON LEGISLATIVE ASSEMBLY-- Regular Session Senate Bill 0 Printed pursuant to Senate Interim Rule. by order of the President of the Senate in conformance with presession filing rules, indicating neither

More information

INTELLIGENCE DRIVEN GRC FOR SECURITY

INTELLIGENCE DRIVEN GRC FOR SECURITY INTELLIGENCE DRIVEN GRC FOR SECURITY OVERVIEW Organizations today strive to keep their business and technology infrastructure organized, controllable, and understandable, not only to have the ability to

More information

Addressing Vulnerabilities By Integrating Your Incident Response Plans. Brian Coates Enaxis Consulting

Addressing Vulnerabilities By Integrating Your Incident Response Plans. Brian Coates Enaxis Consulting Addressing Vulnerabilities By Integrating Your Incident Response Plans Brian Coates Enaxis Consulting Contents Enaxis Introduction Presenter Bio: Brian Coates Incident Response / Incident Management in

More information

Could the BIGGEST Threat to Your Business be INSIDE Your Company?

Could the BIGGEST Threat to Your Business be INSIDE Your Company? Could the BIGGEST Threat to Your Business be INSIDE Your Company? Presented By: Cheryl W. Snead, Banneker Industries, Inc. Rick Avery, Securitas Security Inc. Cheryl W. Snead President/CEO/Facility Security

More information

Table of Contents. Sample

Table of Contents. Sample TABLE OF CONTENTS... 1 CHAPTER 1 INTRODUCTION... 4 1.1 GOALS AND OBJECTIVES... 5 1.2 REQUIRED REVIEW... 5 1.3 APPLICABILITY... 5 1.4 ROLES AND RESPONSIBILITIES SENIOR MANAGEMENT AND BOARD OF DIRECTORS...

More information

Cyber Security Program

Cyber Security Program Cyber Security Program Cyber Security Program Goals and Objectives Goals Provide comprehensive Security Education and Awareness to the University community Build trust with the University community by

More information

Department of Justice Policing and Victim Services BUSINESS PLAN

Department of Justice Policing and Victim Services BUSINESS PLAN Policing and Victim Services BUSINESS PLAN 2004-2005 1. The Creation of a New Division The was created in 2001 by joining the former Divisions: Policing and Public Safety Services and Victims Services.

More information

CYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017

CYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017 CYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017 Sponsored by: Kansas Municipal Utilities Kansas Municipal Energy Agency Kansas Power Pool CYBERSECURITY TRAINING EXERCISE DATE November

More information

PD 7: Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection

PD 7: Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection PD 7: Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection December 17, 2003 SUBJECT: Critical Infrastructure Identification, Prioritization,

More information

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services EY s Forensic

More information

Inter-American Port Security Cooperation Plan

Inter-American Port Security Cooperation Plan Inter-American Port Security Cooperation Plan Thomas Morelli Program Manager for Port & Cargo Security Maritime Administration U.S. Department of Transportation Inter-American Port Security Cooperation

More information

Incident Response Services

Incident Response Services Services Enhanced with Supervised Machine Learning and Human Intelligence Empowering clients to stay one step ahead of the adversary. Secureworks helps clients enable intelligent actions to outsmart and

More information

Maintaining Resiliency Within the Defense Industrial Base Through Preparedness Response and Recovery

Maintaining Resiliency Within the Defense Industrial Base Through Preparedness Response and Recovery Maintaining Resiliency Within the Defense Industrial Base Through Preparedness Response and Recovery Dave Komendat Chief Security Officer The Boeing Company What We Do Today Design, assemble and support

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Advisors and Special Event Domestic Incident Tracker Overview Federal

More information

Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management

Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management Remarks of Marcus Sachs, Senior Vice President and the Chief Security Officer North American Electric Reliability

More information

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016 Bringing cyber to the Board of Directors & C-level and keeping it there Dirk Lybaert, Proximus September 9 th 2016 Dirk Lybaert Chief Group Corporate Affairs We constantly keep people connected to the

More information

Business Continuity Management Program Overview

Business Continuity Management Program Overview Business Continuity Management Program Overview Improving the lives of our customers by connecting them to the power of the digital world CenturyLink Key Objective CenturyLink may modify or terminate this

More information

June 5, 2018 Independence, Ohio

June 5, 2018 Independence, Ohio June 5, 2018 Independence, Ohio The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Securing the Nation at the Community Level 2018 Cuyahoga

More information

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov

More information

Risk Advisory Academy Training Brochure

Risk Advisory Academy Training Brochure Academy Brochure 2 Academy Brochure Cyber Security Our Cyber Security trainings are focused on building your internal capacity to leverage IT related technologies more confidently and manage risk and uncertainty

More information

M.S. IN INFORMATION ASSURANCE MAJOR: CYBERSECURITY. Graduate Program

M.S. IN INFORMATION ASSURANCE MAJOR: CYBERSECURITY. Graduate Program Detroit Mercy s Master of Science in Information Assurance with a major in Cybersecurity is a multi-disciplinary 30-credit-hour graduate degree. It is designed to produce a comprehensively knowledgeable

More information

Cyber Security and Cyber Fraud

Cyber Security and Cyber Fraud Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa

More information

Professional Training Course - Cybercrime Investigation Body of Knowledge -

Professional Training Course - Cybercrime Investigation Body of Knowledge - Overview The expanded use of the Internet has facilitated rapid advances in communications, systems control, and information sharing. Those advances have created enormous opportunities for society, commerce

More information

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Seminar Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Roundtable Crowne Plaza Monroe, Monroe Township, NJ Tuesday, November 8, 2016

More information

Cybersecurity. Securely enabling transformation and change

Cybersecurity. Securely enabling transformation and change Cybersecurity Securely enabling transformation and change Contents... Cybersecurity overview Business drivers Cybersecurity strategy and roadmap Cybersecurity in practice CGI s cybersecurity offering Why

More information

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com Cybersecurity Presidential Policy Directive Frequently Asked Questions kpmg.com Introduction On February 12, 2013, the White House released the official version of the Presidential Policy Directive regarding

More information

Cybersecurity Session IIA Conference 2018

Cybersecurity Session IIA Conference 2018 www.pwc.com/me Cybersecurity Session IIA Conference 2018 Wael Fattouh Partner PwC Cybersecurity and Technology Risk PwC 2 There are only two types of companies: Those that have been hacked, and those that

More information

Global Security Operation Center GSOC

Global Security Operation Center GSOC Global Security Operation Center GSOC Best of Breed Opinion Basic requirements for a best in class Global Security Operation Center. CONSULTING AND INVESTIGATIONS DIVISION The Consulting and Investigations

More information

NATIONAL CAPITAL REGION HOMELAND SECURITY STRATEGIC PLAN SEPTEMBER 2010 WASHINGTON, DC

NATIONAL CAPITAL REGION HOMELAND SECURITY STRATEGIC PLAN SEPTEMBER 2010 WASHINGTON, DC NATIONAL CAPITAL REGION HOMELAND SECURITY STRATEGIC PLAN SEPTEMBER 2010 WASHINGTON, DC Draft Version incorporating Management Review [MR] Edits and Comments Document Date: July 2013 Goal One: Ensure Interoperable

More information

Railroad Infrastructure Security

Railroad Infrastructure Security TRB Annual Meeting January 14, 2002 Session 107 - Railroad Security William C. Thompson william.thompson@jacobs.com 402-697-5011 Thanks to: Bob Ulrich Dr. William Harris Byron Ratcliff Frank Thigpen John

More information

Section One of the Order: The Cybersecurity of Federal Networks.

Section One of the Order: The Cybersecurity of Federal Networks. Summary and Analysis of the May 11, 2017 Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. Introduction On May 11, 2017, President Donald

More information

Steps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m.

Steps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m. Steps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m. The cyber threats are no longer a question of if, but when, a breach will occur. It is important

More information

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination

More information

National Counterterrorism Center

National Counterterrorism Center National Counterterrorism Center Vision To become the nation s center of excellence for terrorism and counterterrorism issues, orchestrating and shaping the national and international effort to eliminate

More information

CYBER INSURANCE: MANAGING THE RISK

CYBER INSURANCE: MANAGING THE RISK CYBER INSURANCE: MANAGING THE RISK LEON FOUCHE PARTNER & NATIONAL CYBERSECURITY LEAD BDO AUSTRALIA MEMBER OF THE GLOBAL CYBERSECURITY LEADERSHIP GROUP ii CYBER INSURANCE: MANAGING THE RISK There s no doubt

More information

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating

More information

PREPARED STATEMENT OF ERNEST R. FRAZIER, SR., ESQ. AMTRAK, CHIEF OF POLICE AND SECURITY DEPARTMENT

PREPARED STATEMENT OF ERNEST R. FRAZIER, SR., ESQ. AMTRAK, CHIEF OF POLICE AND SECURITY DEPARTMENT PREPARED STATEMENT OF ERNEST R. FRAZIER, SR., ESQ. AMTRAK, CHIEF OF POLICE AND SECURITY DEPARTMENT HOUSE TRANSPORTATION & INFRASTRUCTURE SUBCOMMITTEE ON RAILROADS Oversight Hearing on Railroad Security

More information

Member of the County or municipal emergency management organization

Member of the County or municipal emergency management organization EMERGENCY OPERATIONS PLAN SUUPPORT ANNEX B PRIVATE-SECTOR COORDINATION Coordinating Agency: Cooperating Agencies: Chatham Emergency Management Agency All Introduction Purpose This annex describes the policies,

More information

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution Service SM Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution Product Protecting sensitive data is critical to being

More information

Cybersecurity and Hospitals: A Board Perspective

Cybersecurity and Hospitals: A Board Perspective Cybersecurity and Hospitals: A Board Perspective Cybersecurity is an important issue for both the public and private sector. At a time when so many of our activities depend on information systems and technology,

More information

Introduction to Business Continuity Management

Introduction to Business Continuity Management Introduction to Business Continuity Management Audio Presented by ABD s Occupational Health and Safety Team Featuring The Cross Connection JULY 24, 2018 Speaker Panel ABD Insurance & Financial Services

More information

Global Risks Peculiar to Resorts: Richard G. Hudak Managing Partner Resort Security Consulting Inc.

Global Risks Peculiar to Resorts: Richard G. Hudak Managing Partner Resort Security Consulting Inc. Global Risks Peculiar to Resorts: Prevention, Management, Litigation Richard G. Hudak Managing Partner Resort Security Consulting Inc. www.resortsecurity.com Presenters Richard G. Hudak, Managing Partner,

More information

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016 ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016 Introduction Special guest speaker ISACA Audit committee member, Rosemary Amato Open dialog Wrap-up and close Special guest speaker CISA, CMA, CPA,

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Organisation for the Prohibition of Chemical Weapons September 13, 2011 Overall Landscape

More information

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21 National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security

More information

A Checklist for Compliance in the Cloud 1. A Checklist for Compliance in the Cloud

A Checklist for Compliance in the Cloud 1. A Checklist for Compliance in the Cloud A Checklist for Compliance in the Cloud 1 A Checklist for Compliance in the Cloud A Checklist for Compliance in the Cloud 1 With the industrialization of hacking and the enormous impact of security breaches,

More information

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association page 1 Cybersecurity Strategy Essential Points The norms, principles and values that the City of Vienna and the

More information